sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

578
active users

#NetworkEngineering

0 posts0 participants0 posts today

This morning I successfully converted my internal DNS to corp.avvira.us. I’m glad that I read about the whole problematic fake internal domain thing yesterday because that could rear its ugly head. I also learned about something very important. I made yet another mistake in my planning.

I’ve never designed anything that would ever grow beyond a /22 or 1022 hosts on a network. Now I find myself in a situation where I have to plan for a case where this could happen: my own business. So I read up more carefully on variable length subnet masking. Apparently, you have to estimate what your largest subnet size will be and then carve up from there. So again I planned poorly with thinking I’d just carve up 172.16.0.0/12 into a whole bunch of /24s. That would leave a large and inefficient routing table.

So it’s better to think this one through carefully. I’m seeing this now. It might make sense instead to carve this up into several /18s, and from there, further divide into smaller units as needed here and there. I guess I need someone with more advanced #NetworkEngineering experience than I have. Feel free to weigh in on this.

Ever wanted to dive deeper into packet analysis using Python? Check out this video: “Analyzing Capture Files in Python with PyShark” by Dor Green from a past SharkFest, an excellent example of the hands-on, technical training you'll experience at SharkFest'25 Europe.

youtube.com/watch?v=qxBKHsMhWK

Want real world, expert led sessions like this + access to the latest in Wireshark and Stratoshark training? Then join us in Warsaw this November for SharkFest'25 Europe, where you'll learn directly from the best in the field.

Sign up today: sharkfest.wireshark.org/sfeu

I have a very weird issue with my #tailscale + #mumble server setup:

I have a murmur (mumble) server that binds to the tailscale interface on my server.

I have shared that endpoint with a friend and we're both connecting via tailscale to that mumble server to talk.

Every few minutes (3, 5, something like that), one of us gets reconnected. Mumble (client) says "Server failed to respond to TCP ping". On the server it says (murmur log): "Connection closed: The remote host closed the connection".

The tailscale log on the server says something like "adding connection to derp-* for ..." at that very moment of reconnecting.

How to debug this issue? I don't even know where to start. It looks like (to me, as a networking noob) that tailscale reconfigures connections and breaks the mumble connection.

#followerpower #linuxadmin #NetworkEngineering #networking #sysadmin

CC @tailscale

Please boost :boost_ok:

The Wireshark Certified Analyst certification has been available for just over a month and professionals have already started leveraging it to validate and elevate their packet analysis skills.

Designed by the Wireshark Foundation with input from core developers and engineering educators, this rigorous certification tests both protocol knowledge (Ethernet, IP, TCP, UDP, DNS, DHCP) and advanced troubleshooting using real-world Wireshark tools.

If you’ve been mastering packet captures and troubleshooting in the field, earning the WCA is a powerful way to showcase your expertise and stand out professionally.

Find all the details, objectives, and registration info here: wireshark.org/certifications

Ready to level up your packet analysis game? At SharkFest’25 EUROPE in Warsaw, you'll have the unique opportunity to learn Wireshark and Stratoshark from experts who build and use them every day.

Join hands-on workshops, deep-dive technical sessions, and interactive labs led by top professionals designed to sharpen your traffic capture, analysis, and troubleshooting skills. Whether you're a seasoned network engineer or emerging pro, this is where theory meets practical expertise.

Register now: sharkfest.wireshark.org/sfeu

SASE platforms that rely on MiTM ALL of your network traffic degrade your network security because all of your engineers have to either write code to get around it or disable ALL certificate validation in their code that accesses remote resources.

Also from what I know, when they "whitelist" a remote resource to allow internal clients to access something its just checking a box that says don't validate SSL for this particular remote resource.

I'm open to being wrong here, but I feel like products that break native certificate validation are bad.

Join us in Poland this November!

Start your week off right with Pre-Conference Class I: Essential Wireshark Skills: Practical Packet Analysis led by network pro Ross Bagurdes. Whether you're new to Wireshark or brushing up your skills, this hands-on class will get you up to speed on capturing, analyzing, and filtering traffic with clarity and confidence.

Learn more + register: sharkfest.wireshark.org/sfeu

Join us for Wireshark Education Day in Paris, France on September 9, 2025 for a full day of hands-on learning, expert talks, and packet analysis insights.

Dive into topics like capture points, VoIP analysis, security, and real-world troubleshooting, with sessions led by Wireshark experts including Alexis La Goutte, Michel ROUSSEAU, Jean-Paul ARCHIER, and Roland Knall.

- Campus Cyber, Paris
- September 9, 2025
- Sponsored by: Profitap

Register here now: ticketing.wireshark.org/wsug/w

New SharkBytes Podcast Episode!

Wireshark creator @geraldcombs chats with Chris Greer & Ross Bagurdes about the brand new Wireshark Certified Analyst (WCA) exam.

Learn how it was built, who it's for, and how it can boost your network analysis skills.

Watch: youtube.com/watch?v=ebEMH60BdZ
Listen: sharkbytes.transistor.fm/
Get certified: wireshark.org/certifications

Want to get hands-on with our new tool Stratoshark for analyzing system calls and cloud logs?

SharkFest’25 US is the place to do it. Learn how Stratoshark bridges the gap between packet data & system-level insight with these must-attend sessions:

🔹 New Kid on the Block: Stratoshark – Explore what Stratoshark is, how it works, and why it matters
🔹 Using sysdig and Stratoshark to examine system internals – real life troubleshooting with Stratoshark

Meet the minds behind the tool & see where network analysis is headed next.

Register now: sharkfest.wireshark.org/sfus/

But, I have done something that is super cool and I have nobody to share it with, and nothing to show for it besides some passing tests.

github.com/zeyus/liblsl.dart/b (readme is outdated, see tests)

HMU if you're a #softwareengineering , #networkengineering , #systemsarchitecture or #designpattern nerd, I'd love feedback and suggestions for improvement (or just question my sanity)

GitHubliblsl.dart/packages/liblsl at main · zeyus/liblsl.dartDart interface for Lab Streaming Layer / liblsl. Contribute to zeyus/liblsl.dart development by creating an account on GitHub.